๐ฉ How do I hack someone computer or mobile by his/her ip address? ๐ฉ
First of all you need to know the difference between the two types of ip address,i.e.
static ip and dynamic ip.
Most of the people doesn't have a static ip. Only some big organization or companies have static ip address. On the other hand almost every common person have dynamic ip connection. Dynamic ip means that, every time you disconnect and reconnect to the internet, your system is assigned a completely new ip address.
Whereas in static ip, it doesn't matter how many times you reconnect to the internet, your ip would be the same everytime
If you are planning to attack someone who is having a static ip connection then you can move on. But if the victim is having a dynamic ip connection then you can not guess the validity of that ip.
In this case if the victim disconnects and reconnect to the internet then you have to obtain the ip address once again. So i think you got the differences between the two types of ip address by now.
Now back to the question. Even if you have the victim's ip address, its not going to help you unless there is a backdoor in the victim's system. By backdoor, i mean an open port that can listen to and reply back to your data packets. This can even be done if there is a vulnerable application present in victim's system. The best example of a backdoor is something known as the trojan horse or RAT standing for remote administration tool. So i think you've got answer to your question.
Posted by : @Mr_Neophyte
๐ฆ Share and support us๐ฆ
First of all you need to know the difference between the two types of ip address,i.e.
static ip and dynamic ip.
Most of the people doesn't have a static ip. Only some big organization or companies have static ip address. On the other hand almost every common person have dynamic ip connection. Dynamic ip means that, every time you disconnect and reconnect to the internet, your system is assigned a completely new ip address.
Whereas in static ip, it doesn't matter how many times you reconnect to the internet, your ip would be the same everytime
If you are planning to attack someone who is having a static ip connection then you can move on. But if the victim is having a dynamic ip connection then you can not guess the validity of that ip.
In this case if the victim disconnects and reconnect to the internet then you have to obtain the ip address once again. So i think you got the differences between the two types of ip address by now.
Now back to the question. Even if you have the victim's ip address, its not going to help you unless there is a backdoor in the victim's system. By backdoor, i mean an open port that can listen to and reply back to your data packets. This can even be done if there is a vulnerable application present in victim's system. The best example of a backdoor is something known as the trojan horse or RAT standing for remote administration tool. So i think you've got answer to your question.
Posted by : @Mr_Neophyte
๐ฆ Share and support us๐ฆ
๐ ๐ผ๐๐๐๐๐ ๐๐๐๐ ๐ฐ๐ฟ๐บ (๐ฐ๐ ๐ต๐๐๐, ๐ผ๐พ๐ณ)
๐๐๐๐๐ ๐๐ ๐ณ๐๐ ๐๐๐๐๐ ๐ท๐ถ๐ถ๐ถ๐ถ+ ๐ผ๐๐๐๐๐, ๐๐๐ ๐๐๐๐๐๐ & ๐ป๐๐๐ ๐๐ (๐ฝ๐๐๐๐๐๐ก, ๐ท๐๐๐๐๐๐, ๐ฟ๐๐๐๐ ๐ ๐๐๐๐ ๐ฒ๐๐๐๐๐๐ ๐ฐ๐๐๐๐)
๐๐ธ ๐๐ ๐ฐ๐ ๐๐๐๐๐, ๐ต๐๐๐ ๐๐๐๐๐๐๐
๐ฅ ๐ณ๐๐ ๐๐๐๐๐ ๐๐๐๐ : -
๐ https://dropgalaxy.in/nshpgfzsbuer
โโโโโโโโโโโโ
๐๐๐๐๐ ๐๐ ๐ณ๐๐ ๐๐๐๐๐ ๐ท๐ถ๐ถ๐ถ๐ถ+ ๐ผ๐๐๐๐๐, ๐๐๐ ๐๐๐๐๐๐ & ๐ป๐๐๐ ๐๐ (๐ฝ๐๐๐๐๐๐ก, ๐ท๐๐๐๐๐๐, ๐ฟ๐๐๐๐ ๐ ๐๐๐๐ ๐ฒ๐๐๐๐๐๐ ๐ฐ๐๐๐๐)
๐๐ธ ๐๐ ๐ฐ๐ ๐๐๐๐๐, ๐ต๐๐๐ ๐๐๐๐๐๐๐
๐ฅ ๐ณ๐๐ ๐๐๐๐๐ ๐๐๐๐ : -
๐ https://dropgalaxy.in/nshpgfzsbuer
โโโโโโโโโโโโ
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฐ Beginners' Financial Market: Assets, Players, & Investments ๐ฐ
Know the basics of investment and the players & the nature of financial markets.
Link :- https://anontricks.tech/beginners-financial-market-assets-players-investments/
Share And Support Us โ๏ธ
Know the basics of investment and the players & the nature of financial markets.
Link :- https://anontricks.tech/beginners-financial-market-assets-players-investments/
Share And Support Us โ๏ธ
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from โ ๏ธ Hate Hackerโข ๐ป
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Techโข (H A C K โ ๏ธ T E C H ๐ฎ๐ณ -| ฯฮฑฮทโฮฑีน |- Tษจโ เธโเบฎแตแถฌ)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Techโข (H A C K โ ๏ธ T E C H ๐ฎ๐ณ -| ฯฮฑฮทโฮฑีน |- Tษจโ เธโเบฎแตแถฌ)
This media is not supported in your browser
VIEW IN TELEGRAM
Windows Hacking/Red teaming resources | @itscybertech
Forwarded from Cyber Techโข (H A C K โ ๏ธ T E C H ๐ฎ๐ณ -| ฯฮฑฮทโฮฑีน |- Tษจโ เธโเบฎแตแถฌ)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Techโข (H A C K โ ๏ธ T E C H ๐ฎ๐ณ -| ฯฮฑฮทโฮฑีน |- Tษจโ เธโเบฎแตแถฌ)
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฐ Intro to Ethical Hacking Certification ๐ฐ
Certified Ethical Hacking Introduction.
Link :- https://anontricks.tech/intro-to-ethical-hacking-certification/
Share And Support Us โ๏ธ
Certified Ethical Hacking Introduction.
Link :- https://anontricks.tech/intro-to-ethical-hacking-certification/
Share And Support Us โ๏ธ
Forwarded from Cyber Techโข (H A C K โ ๏ธ T E C H ๐ฎ๐ณ -| ฯฮฑฮทโฮฑีน |- Tษจโ เธโเบฎแตแถฌ)
This media is not supported in your browser
VIEW IN TELEGRAM
๐คฉ Get wordpress woocommerce theme for free with lietime Liscense. ๐
Liscense available for unlimited sites.
https://woovina.com/
@itscybertech
Enjoy โค
Liscense available for unlimited sites.
https://woovina.com/
@itscybertech
Enjoy โค
Forwarded from Cyber Techโข (H A C K โ ๏ธ T E C H ๐ฎ๐ณ -| ฯฮฑฮทโฮฑีน |- Tษจโ เธโเบฎแตแถฌ)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Techโข (H A C K โ ๏ธ T E C H ๐ฎ๐ณ -| ฯฮฑฮทโฮฑีน |- Tษจโ เธโเบฎแตแถฌ)
This media is not supported in your browser
VIEW IN TELEGRAM